Author of the publication

Adversarial Attack on Fake-Faces Detectors Under White and Black Box Scenarios.

, , , and . ICIP, page 3627-3631. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Multi-Bit Watermarking for Free-View Television Using Light Field Rendering., , , , and . IEICE Trans. Inf. Syst., 96-D (12): 2820-2829 (2013)Security Consideration For Deep Learning-Based Image Forensics., , , , and . CoRR, (2018)A 3D Mesh Watermarking Based on Improved Vertex Grouping and Piecewise Mapping Function., , and . J. Inf. Hiding Multim. Signal Process., 8 (1): 97-108 (2017)Reversible Watermarking Based on Invariability and Adjustment on Pixel Pairs., , , and . IEEE Signal Process. Lett., (2008)Region of Interest Watermarking Based on Fractal Dimension., and . ICPR (3), page 934-937. IEEE Computer Society, (2006)Adaptive reversible watermarking using trimmed prediction and pixel-selection-based sorting., , , and . ChinaSIP, page 616-620. IEEE, (2014)Combination of EOG and EEG for emotion recognition over different window sizes., , , , , and . ICHMS, page 1-6. IEEE, (2021)Robust median filtering detection based on the difference of frequency residuals., , , and . Multimedia Tools Appl., 78 (7): 8363-8381 (2019)Detection of various image operations based on CNN., , , and . APSIPA, page 1479-1485. IEEE, (2017)Anti-forensics of contrast enhancement in digital images., , , and . MM&Sec, page 25-34. ACM, (2010)